{"id":1406,"date":"2019-12-04T21:22:05","date_gmt":"2019-12-05T02:22:05","guid":{"rendered":"http:\/\/insurtechadvisors.com\/?page_id=1406"},"modified":"2019-12-04T21:22:05","modified_gmt":"2019-12-05T02:22:05","slug":"state-data-security-laws-2019","status":"publish","type":"page","link":"https:\/\/insurtechadvisors.com\/old\/state-data-security-laws-2019\/","title":{"rendered":"State Data Protection Laws 2019"},"content":{"rendered":"\n<h2 class=\"has-text-color wp-block-heading\" style=\"color:#871e31\">2019 State-by-state data protection laws for the private sector<\/h2>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table class=\"has-fixed-layout\"><tbody><tr><td>\n  <strong>State<\/strong>\n  <\/td><td>   <strong>Regulation<\/strong><\/td><td>\n  <strong>Applies to:<\/strong>\n  <\/td><td>\n  <strong>Security Measures Required<\/strong>\n  <\/td><\/tr><tr><td>\n  <strong>Alabama<\/strong>\n  <\/td><td>\n  <a href=\"https:\/\/arc-sos.state.al.us\/PAC\/SOSACPDF.001\/A0012674.PDF\" target=\"_blank\" rel=\"noreferrer noopener\">2018 S.B. 318<\/a>\n  <\/td><td>A person, sole   proprietorship, partnership, government entity, corporation, nonprofit,   trust, estate, cooperative association, or other business entity that acquires   or uses sensitive personally identifying information.   <\/td><td>Implement and   maintain reasonable security measures   (as specified\/ detailed in statute)   to protect sensitive   personally identifying information against a breach of security.   <\/td><\/tr><tr><td>\n  <strong>Arkansas<\/strong>\n  &nbsp;\n  <\/td><td>\n  <a href=\"https:\/\/advance.lexis.com\/documentpage\/?pdmfid=1000516&amp;crid=62d1d7c4-9a4c-48f3-8f6a-a3a47c693e4a&amp;nodeid=AAEAAHAAZAAE&amp;nodepath=%2FROOT%2FAAE%2FAAEAAH%2FAAEAAHAAZ%2FAAEAAHAAZAAE&amp;level=4&amp;haschildren=&amp;populated=false&amp;title=4-110-104.+Protection+of+personal+information.&amp;config=00JAA2ZjZiM2VhNS0wNTVlLTQ3NzUtYjQzYy0yYWZmODJiODRmMDYKAFBvZENhdGFsb2fXiYCnsel0plIgqpYkw9PK&amp;pddocfullpath=%2Fshared%2Fdocument%2Fstatutes-legislation%2Furn%3AcontentItem%3A4WVD-4KB0-R03N-607V-00008-00&amp;ecomp=-_57kkk&amp;prid=ec93c6d5-0cfe-4850-89cf-05a559a5a978\" target=\"_blank\" rel=\"noreferrer noopener\">Ark. Code \u00a7 4-110-104(b)<\/a>\n  <\/td><td> A person or business that acquires, owns or licenses   personal information   <\/td><td>Implement and maintain reasonable security procedures   and practices appropriate to the nature of the information.   <\/td><\/tr><tr><td>\n  <strong>California<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=CIV&amp;sectionNum=1798.81.5\" target=\"_blank\">Cal Civ. Code \u00a7\u00a01798.81.5<\/a>   <\/td><td>A business that owns, licenses, or maintains personal   information.   \u00a0   Third party contractors   <\/td><td>Implement and maintain reasonable security procedures   and practices appropriate to the nature of the information.   <\/td><\/tr><tr><td>\n  <strong>California<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/billCompareClient.xhtml?bill_id=201720180SB327\" target=\"_blank\">Calif. Civil Code \u00a7   1798.91.04<\/a>   <\/td><td>Manufacturers of   connected devices sold in California.   <\/td><td>Equip the device with reasonable security features that   are appropriate to the nature and function of the device and the information   it may collect, contain, or transmit, and that are designed to protect the   device and any information it contains from unauthorized access, destruction,   use, modification, or disclosure.   <\/td><\/tr><tr><td>\n  <strong>Colorado<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/advance.lexis.com\/documentpage\/?pdmfid=1000516&amp;crid=c250e874-e9ea-4971-9e42-1ddc63340a1d&amp;action=pawlinkdoc&amp;pdcomponentid=&amp;pddocfullpath=%2Fshared%2Fdocument%2Fstatutes-legislation%2Furn%3AcontentItem%3A5T3S-CJF0-004D-12SS-00008-00&amp;pdtocnodeidentifier=AAGAABAABAAHAAQ&amp;config=014FJAAyNGJkY2Y4Zi1mNjgyLTRkN2YtYmE4OS03NTYzNzYzOTg0OGEKAFBvZENhdGFsb2d592qv2Kywlf8caKqYROP5&amp;ecomp=8gqfkkk&amp;prid=6e056e58-4590-48ed-b9da-08fee40f66ae\" target=\"_blank\">Colo. Rev. Stat. \u00a7 6-1-713.5\u00a0\u00a0<\/a>(<a rel=\"noreferrer noopener\" href=\"https:\/\/leg.colorado.gov\/bills\/hb18-1128\" target=\"_blank\">2018 H.B. 1128<\/a>)   <\/td><td>Any entity that   maintains, owns, or licenses personal identifying information in the course   of the person\u2019s business or occupation.   <\/td><td>Develop written policies for the proper disposal of   personal information once such information is no longer needed. Implement and   maintain reasonable security practices and procedures to protect personal   identifying information from unauthorized access.   <\/td><\/tr><tr><td>\n  <strong>Connecticut<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.cga.ct.gov\/current\/pub\/chap_705.htm#sec_38a-999b\" target=\"_blank\">Conn. Gen. Stat. \u00a7 38a-999b<\/a>   <\/td><td>Any health insurer, health care center or other entity   licensed to do health insurance business in the\u00a0state.   <\/td><td>Implement and maintain a comprehensive information   security program to safeguard the personal information of insureds and   enrollees that is compiled or maintained by such company.   <\/td><\/tr><tr><td>\n  <strong>Connecticut<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.cga.ct.gov\/current\/pub\/chap_062a.htm\" target=\"_blank\">Conn. Gen.\u00a0Stat.   \u00a7\u00a04e-70<\/a>   <\/td><td>Contractors: an individual, business or other entity   that is receiving confidential information from a state contracting agency or   agent of the state pursuant to a written agreement to provide goods or   services to the state.   <\/td><td>Implement and maintain a comprehensive data-security   program\u00a0<strong>(as specified\/detailed in statute)<\/strong>\u00a0including   encryption of all sensitive personal data transmitted wirelessly or via a   public Internet connection, or contained on portable electronic devices has   to be encrypted as well.   <\/td><\/tr><tr><td>\n  <strong>Delaware<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/delcode.delaware.gov\/title6\/c012b\/index.shtml\" target=\"_blank\">Del. Code \u00a7 12B-100<\/a>   <\/td><td>Any person who conducts business in the state and owns,   licenses, or maintains personal information.   \u00a0   <\/td><td>Implement and   maintain reasonable procedures and practices to prevent the unauthorized   acquisition, use, modification, disclosure, or destruction of personal   information collected or maintained in the regular course of business.   <\/td><\/tr><tr><td>\n  <strong>Florida<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.leg.state.fl.us\/statutes\/index.cfm?App_mode=Display_Statute&amp;Search_String=&amp;URL=0500-0599\/0501\/Sections\/0501.171.html\" target=\"_blank\">Fla. Stat. \u00a7 501.171(2)<\/a>   <\/td><td>Covered entities (sole proprietorship, partnership,   corporation, trust, estate, cooperative, association, or other commercial   entity) and   \u00a0   Third-party agent (entity that has been contracted to   maintain, store, or process personal information on behalf of a covered   entity or governmental entity).   <\/td><td>Reasonable measures to protect and secure data in electronic   form containing personal information.   <\/td><\/tr><tr><td>\n  <strong>Illinois<\/strong>\n  <\/td><td>\n  <a href=\"https:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=2702&amp;ChapterID=67\">https:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=2702&amp;ChapterID=67<\/a>\n  <\/td><td>A data collector   that owns or licenses, or maintains or stores but does not own or license,   records that contain personal information.   <\/td><td>Implement and   maintain reasonable security measures to protect those records from   unauthorized access, acquisition, destruction, use, modification, or   disclosure.\u00a0A contract for the disclosure of personal information must   include a provision requiring the person to whom the information is disclosed   to implement and maintain reasonable security measures.   <\/td><\/tr><tr><td>\n  <strong>Indiana<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/iga.in.gov\/legislative\/laws\/2015\/ic\/titles\/024\/articles\/4.9\/chapters\/003\/#section-3.5\" target=\"_blank\">Ind. Code \u00a7 24-4.9-3-3.5<\/a>   <\/td><td>A database owner: a person that owns or licenses   computerized data that includes personal information.   <\/td><td>Implement and maintain reasonable procedures, including   taking any appropriate corrective action.   <\/td><\/tr><tr><td>\n  <strong>Kansas<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/kslegislature.org\/li\/b2017_18\/statute\/050_000_0000_chapter\/050_006_0000_article\/050_006_0139b_section\/050_006_0139b_k\/\" target=\"_blank\">K.S.\u00a0\u00a7\u00a050-6,139b<\/a>   <\/td><td>A holder of personal information: a person who, in the ordinary course of business,   collects, maintains or possesses, or causes to be collected, maintained or   possessed, the personal information of any other person.   <\/td><td>Implement and maintain reasonable procedures and   practices appropriate to the nature of the information, and exercise   reasonable care to protect the personal information from unauthorized access,   use, modification or disclosure.\u00a0   <\/td><\/tr><tr><td>\n  <strong>Louisiana<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.legis.la.gov\/legis\/Law.aspx?d=322030\" target=\"_blank\">La. Rev. Stat. \u00a7 3074<\/a>   (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.legis.la.gov\/legis\/ViewDocument.aspx?d=1101149\" target=\"_blank\">2018 S.B. 361<\/a>)   <\/td><td>Any person that   conducts business in the state or that owns or licenses computerized data   that includes personal information.   <\/td><td>Implement and   maintain reasonable security procedures and practices appropriate to the   nature of the information to protect the personal information from   unauthorized access, destruction, use, modification, or disclosure.   <\/td><\/tr><tr><td>\n  <strong>Maryland<\/strong>\n  <\/td><td><a href=\"https:\/\/mgaleg.maryland.gov\/webmga\/frmStatutesText.aspx?article=gcl&amp;section=14-3501&amp;ext=html&amp;session=2016RS&amp;tab=subject5\">Md. Code Com Law \u00a7\u00a7 14-3501   to -3503<\/a>   <\/td><td>A business: a sole proprietorship, partnership,   corporation, association, or any other business entity, whether or not   organized to operate at a profit.   Business includes a financial institution\u2026   \u00a0   Non affiliated third party\/service provider   <\/td><td>Implement and maintain reasonable security procedures   and practices appropriate to the nature of the personal information owned or   licensed and the nature and size of the business and its operations.   <\/td><\/tr><tr><td>\n  <strong>Massachusetts<\/strong>\n  <\/td><td>Mass. Gen. Laws\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/malegislature.gov\/Laws\/GeneralLaws\/PartI\/TitleXV\/Chapter93H\/Section2\" target=\"_blank\">Ch. 93H \u00a7 2(a)<\/a>   <\/td><td>Any person that owns or licenses personal information.   <\/td><td>Authorizes regulations to ensure the security and   confidentiality of customer information in a manner fully consistent with   industry standards. The regulations shall take into account the person&#8217;s   size, scope and type of business, resources available, amount of stored data,   and the need for security and confidentiality of both consumer and employee   information. See also\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.mass.gov\/ocabr\/docs\/idtheft\/201cmr1700reg.pdf\" target=\"_blank\">201 Mass. Code of Regs. 17.00-17.04<\/a>   <\/td><\/tr><tr><td>\n  <strong>Minnesota<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.revisor.mn.gov\/statutes\/?id=325M.05\" target=\"_blank\">Minn. Stat. \u00a7 325M.05<\/a>   <\/td><td>Internet service providers.   <\/td><td>Take reasonable steps to maintain the security and   privacy of a consumer&#8217;s personally identifiable information.   <\/td><\/tr><tr><td>\n  <strong>Nebraska<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/nebraskalegislature.gov\/laws\/statutes.php?statute=87-801\" target=\"_blank\">Neb. Rev. Stat. \u00a7\u00a7 87-801-807\u00a0<\/a>(<a rel=\"noreferrer noopener\" href=\"https:\/\/nebraskalegislature.gov\/FloorDocs\/105\/PDF\/Slip\/LB757.pdf\" target=\"_blank\">2018 L.B. 757<\/a>)   <\/td><td>Any individual or   commercial entity that conducts business in Nebraska and maintains personal   information about Nebraska residents.   <\/td><td>Establish and maintain reasonable security processes and   practices appropriate to the nature of the personal information maintained.   Ensure that all   third parties to whom the entity provides sensitive personal information   establish and maintain reasonable security processes and practices   appropriate to the nature of the personal information maintained.   <\/td><\/tr><tr><td>\n  <strong>Nevada<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.leg.state.nv.us\/nrs\/nrs-603a.html#NRS603ASec210\" target=\"_blank\">Nev. Rev. Stat. \u00a7\u00a7 603A.210, 603A.215(2)<\/a>   <\/td><td>A data collector that maintains records which contain   personal information.   \u00a0   A person to whom a data collector discloses personal   information.   <\/td><td>Implement and maintain reasonable security   measures<\/td><\/tr><tr><td>\n  <strong>New Mexico<\/strong>\n  <\/td><td>N.M. Stat.\u00a0\u00a7 57-12C-4, 57-12C-5\u00a0(<a rel=\"noreferrer noopener\" href=\"https:\/\/nmlegis.gov\/Sessions\/17%20Regular\/final\/HB0015.pdf\" target=\"_blank\">2017 H.B. 15, Chap. 36<\/a>)   \u00a0   <\/td><td>A person that owns   or licenses personal identifying information of a New Mexico resident.   <\/td><td>Implement and   maintain reasonable security procedures and practices appropriate to the   nature of the information to protect the personal identifying information   from unauthorized access, destruction, use, modification or disclosure.   <\/td><\/tr><tr><td>\n  <strong>Ohio<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/codes.ohio.gov\/orc\/1354.01\" target=\"_blank\">Ohio Rev. Stat. \u00a7 1354.01 to   1354.05<\/a>   (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.legislature.ohio.gov\/legislation\/legislation-documents?id=GA132-SB-220\" target=\"_blank\">2018 S.B. 220<\/a>)   <\/td><td>Business or nonprofit entity, including a financial   institution, that accesses, maintains, communicates, or handles personal   information or restricted information.   <\/td><td>To qualify for an affirmative defense to a cause of   action alleging a failure to implement reasonable information security   controls resulting in a data breach, an entity must create, maintain, and   comply with a written cybersecurity program that contains administrative,   technical, and physical safeguards for the protection of personal information   as specified (e.g., conforming to an industry recognized cybersecurity   framework as listed in the act).   <\/td><\/tr><tr><td>\n  <strong>Oregon<\/strong>\n  &nbsp;\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.oregonlegislature.gov\/bills_laws\/ors\/ors646A.html\" target=\"_blank\">Or. Rev. Stat \u00a7 646A.622<\/a>   <\/td><td>Any person that owns, maintains or otherwise possesses   data that includes a consumer\u2019s personal information that is used in the   course of the person\u2019s business, vocation, occupation or volunteer   activities.   <\/td><td>Develop, implement and maintain reasonable safeguards to   protect the security, confidentiality and integrity of the personal   information, including disposal of the data  <\/td><\/tr><tr><td>\n  <strong>Rhode Island<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/webserver.rilin.state.ri.us\/Statutes\/TITLE11\/11-49.3\/11-49.3-2.HTM\" target=\"_blank\">R.I. Gen. Laws \u00a7 11-49.3-2<\/a>   <\/td><td>A business that owns or licenses computerized   unencrypted personal information.   \u00a0   A non affiliated third-party contractor.   <\/td><td>Implement and maintain a risk-based information security   program with reasonable security procedures and practices appropriate to the   nature of the information.   \u00a0   <\/td><\/tr><tr><td>\n  <strong>South Carolina<\/strong>\n  <\/td><td><a href=\"https:\/\/www.scstatehouse.gov\/code\/t38c099.php#38-99-10\">S.C. Code \u00a7 38-99-10 to -100.<\/a>   (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.scstatehouse.gov\/sess122_2017-2018\/bills\/4655.htm\" target=\"_blank\">2018 H.B. 4655<\/a>)   <\/td><td>A person licensed, authorized to operate, or registered,   or required to be licensed, authorized, or registered pursuant to the   insurance laws of the state (does not include a purchasing group or a risk   retention group chartered and licensed in another state or a licensee that is   acting as an assuming insurer that is domiciled in another state or   jurisdiction).   <\/td><td>Requires a licensee to develop, implement and maintain a   comprehensive information security program based on the licensee\u2019s risk   assessment. Establishes requirements for the security program, such as   implementing an incident response plan and other details.  <\/td><\/tr><tr><td>\n  <strong>Texas<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/www.statutes.legis.state.tx.us\/Docs\/BC\/htm\/BC.521.htm\" target=\"_blank\">Tex. Bus. &amp; Com. Code \u00a7 521.052<\/a>   \u00a0   <\/td><td>A business or nonprofit athletic or sports association   that collects or maintains sensitive personal information. (Does not apply to   financial institutions)   <\/td><td>Reasonable procedures, including taking any appropriate   corrective action.   <\/td><\/tr><tr><td>\n  <strong>Utah<\/strong>\n  &nbsp;\n  <\/td><td>Utah Code \u00a7\u00a7\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/le.utah.gov\/xcode\/Title13\/Chapter44\/13-44-S102.html\" target=\"_blank\">13-44-101<\/a>,\u00a0<a href=\"https:\/\/le.utah.gov\/xcode\/Title13\/Chapter44\/13-44-S201.html\">-201<\/a>, 301   <\/td><td>Any person who conducts business in the state and   maintains personal information.   <\/td><td>Implement and maintain reasonable procedures.   <\/td><\/tr><tr><td>\n  <strong>Vermont<\/strong>\n  <\/td><td><a rel=\"noreferrer noopener\" href=\"https:\/\/legislature.vermont.gov\/statutes\/chapter\/09\/062\" target=\"_blank\">9 V.S.A \u00a7 2446-2447<\/a>   (2018 H.B. 764)   <\/td><td>Data   brokers-businesses that\u00a0 knowingly collect and license the personal   information of consumers with whom such businesses do not have a direct   relationship.   <\/td><td>Register annually with the Secretary of State. Implement   and maintain a written information security program containing   administrative, technical, and physical safeguards to protect personally   identifiable information.   <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">(as of Nov 2019)<\/p>\n\n\n\n<p class=\"wp-block-paragraph\" style=\"font-size:10px\">(reported by the National Conference of State Legislatures)<\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"card-text\">2019 State-by-state data protection laws for the private sector State Regulation Applies to: Security Measures Required Alabama 2018 S.B. 318 A person, sole proprietorship, partnership, government entity, corporation, nonprofit, trust, estate, cooperative association, or other business entity that acquires or uses sensitive personally identifying information. Implement and maintain reasonable security measures (as specified\/ detailed in [&#8230;]<\/p>\n<p class=\"m-0\"><a class=\"btn btn-outline-secondary btn-read-more\" href=\"https:\/\/insurtechadvisors.com\/old\/state-data-security-laws-2019\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":1408,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","content-type":"","footnotes":""},"class_list":["post-1406","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/pages\/1406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/comments?post=1406"}],"version-history":[{"count":0,"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/pages\/1406\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/media\/1408"}],"wp:attachment":[{"href":"https:\/\/insurtechadvisors.com\/old\/wp-json\/wp\/v2\/media?parent=1406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}